YoVDO

Analyzing Security Threats

Offered By: Udacity

Tags

Cybersecurity Courses Threat Modeling Courses Threat Mitigation Courses OWASP Top 10 Courses

Course Description

Overview

In this course, you’ll start by exploring the current threat landscape and identifying both threats and threat actors that organizations face. You will learn about the OWASP Top 10 and that they pose a critical threat to organizations. Then, you’ll learn all of the ways to mitigate threats, including the OWASP Top 10. Lastly, you’ll learn what threat modeling is and build your own threat models.

Syllabus

  • Introduction to Analyzing Threats
    • In this lesson, you'll be introduced to what you'll be learning about in this course!
  • Identifying Security Threats
    • In this lesson, you will learn about internal threats, external threats, and the OWASP Top 10.
  • Mitigating Threats
    • In this lesson, you will learn different mitigation strategies and the threats they mitigate.
  • Threat Modeling
    • In this lesson, you will use your new skills to create Threat Models for different threat scenarios.
  • Project: Insecure Juice Shop
    • In this lesson, you will work with a large company to assess threats and suggest mitigations.

Taught by

Milind Adari

Related Courses

Learning the OWASP Top 10
LinkedIn Learning
OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration
LinkedIn Learning
Advanced Cyber Security Training: OWASP Top 10 and Web Application Fundamentals
EC-Council via FutureLearn
Pentesting with Daniel Slater (Ethical Hacking/Web Security)
Udemy
OWASP Top 10: API Security Playbook
Pluralsight